Today I’ve seen someone asking how to disable the toast notifications. Microsoft released documentation on how to configure it using a GPO. But, what if
If you reached this blog i assume you already know what Conditional Access is and where it’s used for. Therefor we can skip the smooth
Attack Surface Reduction rules have huge impact on endpoint security in a positive way. Last year I’ve implemented these rules in at least 10 environments
By default, I always block Edge extensions. Sometimes users really need some extensions to make their work easier or safer. Today I got a call
Passwords, the most common thing to authenticate with for years. Everyone knows about it and/or uses it. Since passwords are a weak security feature, and
The problem Last week I was investigating Azure AD sign-in logs to improve security and multi-factor sign-ins. By filtering all sign-ins to show only single-factor
I might be not the only one who thought it would be simple to configure default fonts and styles for Outlook, via Intune. There’s no
In the past I was not really interested in Anti-Virus software. After having completed several Microsoft Defender for Endpoint implementations and migrations for desktops and
Deploying iOS Apps from Intune. How can we do that? Well, as always. It’s simple if you know how. Deploying a VPP (Volume Purchased Program)
Mistakes are being made everywhere and every day. While being an administrator in Azure this could lead to serious issues! Think of removing a resource,